This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
Background: The two most common models for the evolution of metabolism are the patchwork evolution model, where enzymes are thought to diverge from broad to narrow substrate speci...
In this paper, we study the problem of transmission power control and its effects on the link-scheduling performance when a set of end-to-end flows established in the network are g...
— This paper aims at proposing a dynamic resource reservation scheme to enhance wireless multicasting protocols run in the hierarchical mobile IP version 6 (HMIPv6) based network...
Huei-Wen Ferng, Wen-Yan Kao, Jeng-Ji Huang, David ...
This paper addresses the problem of secure path key establishment in wireless sensor networks that uses the random key pre-distribution technique. Inspired by the recent proxybased...